Information and economic security as priority directions of the state policy of Ukraine in the context of the strategy of «smart power»

T Voropayeva, N Averianova - 2021 IEEE 8th International …, 2021 - ieeexplore.ieee.org
In today's world, the problem of information and economic security has become more acute
and has become a global problem. Information and economic dangers and threats have …

Security Baseline for Substation Automation Systems

J Horalek, V Sobeslav - Sensors, 2023 - mdpi.com
The use of information technology and the automation of control systems in the energy
sector enables a more efficient transmission and distribution of electricity. However, in …

A model and method of information system security risk assessment based on MITRE ATT&CK

T He, Z Li - 2021 2nd International Conference on Electronics …, 2021 - ieeexplore.ieee.org
In order to improve the efficiency of information system risk early warning, an information
system risk assessment method (Advantageous Tactics, Technologies, and Common …

[PDF][PDF] Automation of Information Security Risk Assessment

B Akhmetov, V Lakhno, V Chubaievskyi… - … Journal of Electronics …, 2022 - journals.pan.pl
An information security audit method (ISA) for a distributed computer network (DCN) of an
informatization object (OBI) has been developed. Proposed method is based on the ISA …

Integrating Criminological Theories in Cybersecurity Risk Assessment: A Study of the TRACI Framework's Application to Critical Infrastructure

CS Martin - 2024 - search.proquest.com
This dissertation explores the application of the Taxonomy for Risk Assessment of
Cyberattacks on Critical Infrastructure (TRACI) framework, a tool designed to systematically …

Method for Determining the Informativeness and Compliance of Critical Data in the General Field of the Information and Communication System

M Strelbitskyi, O Suprun, V Bezshtanko… - 2022 IEEE 4th …, 2022 - ieeexplore.ieee.org
At the modernization stage of information and telecommunication systems of the national
security subjects of Ukraine there is a problem of information reliability when sharing data is …

[PDF][PDF] The Role of a Microservice Architecture on cybersecurity and operational resilience in critical systems

FP Sebastião - 2023 - recipp.ipp.pt
Critical systems are characterized by their high degree of intolerance to threats, in other
words, their high level of resilience, because depending on the context in which the system …

Національна безпека через конвергенцію систем фінансового моніторингу та кібербезпеки: інтелектуальне моделювання механізмів регулювання …

ГМ Яровенко, ОВ Кузьменко, СВ Лєонов… - 2023 - essuir.sumdu.edu.ua
Об'єкт дослідження–система економічних відносин між суб'єктами економіки та
регуляторами фінансового ринку в процесі комплексного застосування засобів …

[PDF][PDF] Conceptual Approach to the Risk Analysis of Information Technology Security

RS Anosov, SS Anosov, IY Shakhalov, VL Tsirlov - 2021 - ceur-ws.org
This paper describes the risk-oriented approach to the development of information security
systems. The author suggests a concept-based formal model of security risk assessment …

2022 IEEE 4th International Conference on Advanced Trends in Information Theory, ATIT 2022 (Proceedings)

V Ivannikova, K Kurin, O Yudin, O Suprun… - 2023 - doras.dcu.ie
In presented article, the expedience of the use of structural code in the tasks of compression
of data is proved. The structural signs of binary sequences are defined. Structural signs of …